DChain single-node blockchain + React Native messenger client. Core: - PBFT consensus with multi-sig validator admission + equivocation slashing - BadgerDB + schema migration scaffold (CurrentSchemaVersion=0) - libp2p gossipsub (tx/v1, blocks/v1, relay/v1, version/v1) - Native Go contracts (username_registry) alongside WASM (wazero) - WebSocket gateway with topic-based fanout + Ed25519-nonce auth - Relay mailbox with NaCl envelope encryption (X25519 + Ed25519) - Prometheus /metrics, per-IP rate limit, body-size cap Deployment: - Single-node compose (deploy/single/) with Caddy TLS + optional Prometheus - 3-node dev compose (docker-compose.yml) with mocked internet topology - 3-validator prod compose (deploy/prod/) for federation - Auto-update from Gitea via /api/update-check + systemd timer - Build-time version injection (ldflags → node --version) - UI / Swagger toggle flags (DCHAIN_DISABLE_UI, DCHAIN_DISABLE_SWAGGER) Client (client-app/): - Expo / React Native / NativeWind - E2E NaCl encryption, typing indicator, contact requests - Auto-discovery of canonical contracts, chain_id aware, WS reconnect on node switch Documentation: - README.md, CHANGELOG.md, CONTEXT.md - deploy/single/README.md with 6 operator scenarios - deploy/UPDATE_STRATEGY.md with 4-layer forward-compat design - docs/contracts/*.md per contract
102 lines
4.0 KiB
Go
102 lines
4.0 KiB
Go
// Package blockchain — equivocation evidence verification for SLASH txs.
|
|
//
|
|
// "Equivocation" = a validator signing two different consensus messages
|
|
// at the same height+view+phase, each endorsing a different block hash.
|
|
// PBFT safety depends on validators NOT doing this; a malicious validator
|
|
// that equivocates can split honest nodes into disagreeing majorities.
|
|
//
|
|
// The SLASH tx embeds an EquivocationEvidence payload carrying both
|
|
// conflicting messages. Any node (not just the victim) can submit it;
|
|
// on-chain verification is purely cryptographic — no "trust me" from the
|
|
// submitter. If the evidence is valid, the offender's stake is burned and
|
|
// they're removed from the validator set.
|
|
package blockchain
|
|
|
|
import (
|
|
"bytes"
|
|
"crypto/ed25519"
|
|
"crypto/sha256"
|
|
"encoding/hex"
|
|
"encoding/json"
|
|
"fmt"
|
|
)
|
|
|
|
// EquivocationEvidence is embedded (as JSON bytes) in SlashPayload.Evidence
|
|
// when Reason == "equivocation". Two distinct consensus messages from the
|
|
// same validator at the same consensus position prove they are trying to
|
|
// fork the chain.
|
|
type EquivocationEvidence struct {
|
|
A *ConsensusMsg `json:"a"`
|
|
B *ConsensusMsg `json:"b"`
|
|
}
|
|
|
|
// ValidateEquivocation verifies that the two messages constitute genuine
|
|
// equivocation evidence against `offender`. Returns nil on success;
|
|
// errors are returned with enough detail for the applyTx caller to log
|
|
// why a slash was rejected.
|
|
//
|
|
// Rules:
|
|
// - Both messages must be signed by `offender` (From = offender,
|
|
// signature verifies against the offender's Ed25519 pubkey).
|
|
// - Same Type (MsgPrepare or MsgCommit — we don't slash for equivocating
|
|
// on PrePrepare since leaders can legitimately re-propose).
|
|
// - Same View, same SeqNum — equivocation is about the same consensus
|
|
// round.
|
|
// - Distinct BlockHash — otherwise the two messages are identical and
|
|
// not actually contradictory.
|
|
// - Both sigs verify against the offender's pubkey.
|
|
func ValidateEquivocation(offender string, ev *EquivocationEvidence) error {
|
|
if ev == nil || ev.A == nil || ev.B == nil {
|
|
return fmt.Errorf("equivocation: missing message(s)")
|
|
}
|
|
if ev.A.From != offender || ev.B.From != offender {
|
|
return fmt.Errorf("equivocation: messages not from offender %s", offender[:8])
|
|
}
|
|
// Only PREPARE / COMMIT equivocation is slashable. PRE-PREPARE double-
|
|
// proposals are expected during view changes — the protocol tolerates
|
|
// them.
|
|
if ev.A.Type != ev.B.Type {
|
|
return fmt.Errorf("equivocation: messages are different types (%v vs %v)", ev.A.Type, ev.B.Type)
|
|
}
|
|
if ev.A.Type != MsgPrepare && ev.A.Type != MsgCommit {
|
|
return fmt.Errorf("equivocation: only PREPARE/COMMIT are slashable (got %v)", ev.A.Type)
|
|
}
|
|
if ev.A.View != ev.B.View {
|
|
return fmt.Errorf("equivocation: different views (%d vs %d)", ev.A.View, ev.B.View)
|
|
}
|
|
if ev.A.SeqNum != ev.B.SeqNum {
|
|
return fmt.Errorf("equivocation: different seqnums (%d vs %d)", ev.A.SeqNum, ev.B.SeqNum)
|
|
}
|
|
if bytes.Equal(ev.A.BlockHash, ev.B.BlockHash) {
|
|
return fmt.Errorf("equivocation: messages endorse the same block")
|
|
}
|
|
|
|
// Decode pubkey + verify both signatures over the canonical bytes.
|
|
pubBytes, err := hex.DecodeString(offender)
|
|
if err != nil || len(pubBytes) != ed25519.PublicKeySize {
|
|
return fmt.Errorf("equivocation: bad offender pubkey")
|
|
}
|
|
pub := ed25519.PublicKey(pubBytes)
|
|
|
|
if !ed25519.Verify(pub, consensusMsgSignBytes(ev.A), ev.A.Signature) {
|
|
return fmt.Errorf("equivocation: signature A does not verify")
|
|
}
|
|
if !ed25519.Verify(pub, consensusMsgSignBytes(ev.B), ev.B.Signature) {
|
|
return fmt.Errorf("equivocation: signature B does not verify")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// consensusMsgSignBytes MUST match consensus/pbft.go:msgSignBytes exactly.
|
|
// We duplicate it here (instead of importing consensus) to keep the
|
|
// blockchain package free of a consensus dependency — consensus already
|
|
// imports blockchain for types.
|
|
func consensusMsgSignBytes(msg *ConsensusMsg) []byte {
|
|
tmp := *msg
|
|
tmp.Signature = nil
|
|
tmp.Block = nil
|
|
data, _ := json.Marshal(tmp)
|
|
h := sha256.Sum256(data)
|
|
return h[:]
|
|
}
|